Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe
Resource
win10v2004-20231222-en
General
-
Target
017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe
-
Size
6KB
-
MD5
9b9ea1d20c27b2bf82e1ec05d2620fc6
-
SHA1
280ba9385628e7e9991ca093e8e4bc9a8674ccfe
-
SHA256
017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a
-
SHA512
c81bdb558f871fc15d1ba6a8953a93ed0916d407b486f5036a751727a6d5d2fd36741c0f53d85a74e9e0c0b5a0f557692b2d2a3929d506d0c8730281504f83eb
-
SSDEEP
48:Sibt0S4FVgCp471Ib4Fc/38+N7DYocHa23WlTpebVetFygFI5a2oxdVoZiG/9u7O:X0mIGnFc/38+N4ZHJWSY9FI5WqUx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1036 2200 017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe 14 PID 2200 wrote to memory of 1036 2200 017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe 14 PID 2200 wrote to memory of 1036 2200 017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe 14
Processes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2200 -s 321⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe"C:\Users\Admin\AppData\Local\Temp\017cbbc43760fab3c0c9fb771320779d5c9f97f9d3237e3317aae0342d8bbd4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200